chm-based Malware

CHM渗透:从入门到“入狱”
http://www.freebuf.com/articles/system/119874.html

高级组合技打造“完美” 捆绑后门
https://evi1cg.me/archives/chm_backdoor.html

从恶意软件获得的新姿势——通过rundll32.exe执行js原理详细分析
http://bobao.360.cn/learning/detail/164.html

JSRat

https://github.com/Hood3dRob1n/JSRat-Py